咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 207 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 506 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 352 篇 工学
    • 271 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 72 篇 信息与通信工程
    • 38 篇 控制科学与工程
    • 28 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 光学工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 材料科学与工程(可...
    • 13 篇 电气工程
    • 13 篇 建筑学
    • 12 篇 动力工程及工程热...
    • 11 篇 安全科学与工程
    • 10 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 134 篇 理学
    • 81 篇 数学
    • 28 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 16 篇 系统科学
    • 14 篇 化学
  • 93 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 9 篇 法学
  • 8 篇 医学
    • 7 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 哲学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 11 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 educational inst...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 optimization
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites
  • 6 篇 privacy

机构

  • 180 篇 school of comput...
  • 159 篇 state key labora...
  • 112 篇 state key labora...
  • 47 篇 state key labora...
  • 23 篇 state key lab of...
  • 20 篇 institute of art...
  • 13 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key lab. o...
  • 7 篇 state key labora...
  • 7 篇 sino-french engi...
  • 6 篇 national lab. of...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 10 篇 xu ke
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 440 篇 英文
  • 58 篇 其他
  • 10 篇 中文
检索条件"机构=State Key Lab. Of Software Development Environment School of Computer Science & Engineering"
506 条 记 录,以下是311-320 订阅
排序:
Optimizing Virtual Machine Live Migration without Shared Storage in Hybrid Clouds
Optimizing Virtual Machine Live Migration without Shared Sto...
收藏 引用
IEEE International Conference on High Performance Computing and Communications
作者: Shan He Chunming Hu Bin Shi Tianyu Wo Bo Li State Key Laboratory of Software Development Environment (NLSDE) School of Computer Science and Engineering Beihang University Beijing China 100191
Virtual machine live migration technology allows a running VM migrates from one physical host to another with no impact on users. As the scale of distributed computing gets larger and larger, hybrid cloud, which is in... 详细信息
来源: 评论
SALIENCY ANALYSIS BASED ON DEPTH CONTRAST INCREASED
SALIENCY ANALYSIS BASED ON DEPTH CONTRAST INCREASED
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Hao Sheng Xiaoyu Liu Shuo Zhang State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing P.R. China
Humans can understand their surroundings by an additional depth cue that provides by stereopsis, which plays an important role in the human visual system. Recently, depth saliency has been attracted much attention. Bu... 详细信息
来源: 评论
Mining Frequent Itemsets in Correlated Uncertain Databases
收藏 引用
Journal of computer science & Technology 2015年 第4期30卷 696-712页
作者: 童咏昕 陈雷 余洁莹 State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong China
Recently, with the growing popularity of Internet of Things (IoT) and pervasive computing, a large amount of uncertain data, e.g., RFID data, sensor data, real-time video data, has been collected. As one of the most... 详细信息
来源: 评论
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
A new authentication protocol for healthcare applications us...
收藏 引用
作者: Li, Xiong Niu, Jianwei Kumari, Saru Liao, Junguo Liang, Wei Khan, Muhammad Khurram State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing100191 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Department of Mathematics Agra College Dr. B. R. A. University AgraUttar Pradesh282002 India Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia
With the development and maturation of the wireless communication technologies, the wireless sensor networks have been widely applied in different environments to acquire specific information. The wireless medical sen... 详细信息
来源: 评论
PERSON RE-IDENTIFICATION BASED ON HIERARCHICAL BIPARTITE GRAPH MATCHING
PERSON RE-IDENTIFICATION BASED ON HIERARCHICAL BIPARTITE GRA...
收藏 引用
IEEE International Conference on Image Processing
作者: Yan Huang Hao Sheng Zhang Xiong State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 P.R. China
This work proposes a novel person re-identification method based on Hierarchical Bipartite Graph Matching. Because human eyes observe person appearance roughly first and then goes further into the details gradually, o... 详细信息
来源: 评论
ROBUST SALIENCY PROPAGATION BASED ON RANDOM WALKS
ROBUST SALIENCY PROPAGATION BASED ON RANDOM WALKS
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Chao Li Panwen Yang Hao Sheng State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 P.R.China
A variety saliency detection methods have been based on the background prior knowledge. Nevertheless, some image patches connected to the image boundary are foreground noise. In this paper, we propose a saliency detec... 详细信息
来源: 评论
Weight-based sparse coding for multi-shot person re-identification
收藏 引用
science China(Information sciences) 2015年 第10期58卷 38-52页
作者: ZHENG YanWei SHENG Hao ZHANG BeiChen ZHANG Jun XIONG Zhang State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang University Shenzhen Key Laboratory of Data Vitalization Research Institute in ShenzhenBeihang University Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee
Person re-identification(Re-ID) is the problem of matching a person from different cameras based on appearance. It has interesting algorithm challenges and extensive practical applications. This paper presents a weigh... 详细信息
来源: 评论
Performance modeling and evaluation of real-time traffic status query for intelligent traffic systems
Performance modeling and evaluation of real-time traffic sta...
收藏 引用
Asia-Pacific Conference on Communications
作者: Jie Ding Rui Wang Xiao Chen State Key Laboratory for Novel Software Technology Nanjing University China School of Information Engineering Yangzhou University Yangzhou China State Key Laboratory of Software Development Environment Beihang University Beijing China School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China
As product of the combination of Internet technology and sensor network, Internet of things (IoT) greatly facilitates the mutual interaction of the information world and physical world. Furthermore, with the rapid dev... 详细信息
来源: 评论
Towards Better Understanding of App Functions
收藏 引用
Journal of computer science & Technology 2015年 第5期30卷 1130-1140页
作者: 童咏昕 余洁莹 陈雷 State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 China International Research Institute for Multidisciplinary Science Beihang University Beijing 100191 China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong I(ong China
Apps are attracting more and more attention from both mobile and web platforms. Due to the self-organized nature of the current app marketplaces, the descriptions of apps are not formally written and contain a lot of ... 详细信息
来源: 评论
A modeling methodology to facilitate safety-oriented architecture design of industrial avionics software
A modeling methodology to facilitate safety-oriented archite...
收藏 引用
作者: Wu, Ji Yue, Tao Ali, Shaukat Zhang, Huihui State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Certus Software Verification and Validation Center Simula Research Laboratory Lysaker Norway
Summary Ensuring that avionics software meets safety requirements at each development stage is very important to warrant the safe operation of an avionics system. Many safety requirements are imposed by various standa... 详细信息
来源: 评论